Adversary Emulation Emulating the Sophisticated Russian Adversary Seashell Blizzard ByAyelen Torello April 2, 2025July 21, 2025
Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 2 ByFrancis Guibernau February 14, 2025July 31, 2025
Adversary Emulation Updated Response to CISA Advisory (AA23-136A): #StopRansomware: BianLian Ransomware Group ByAyelen Torello January 16, 2025July 31, 2025
Adversary Emulation Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1 ByFrancis Guibernau December 12, 2024July 31, 2025
Adversary Emulation | Iran Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations ByFrancis Guibernau October 17, 2024July 31, 2025
Adversary Emulation Response to CISA Advisory (AA24-207A): North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs ByFrancis Guibernau July 26, 2024July 21, 2025
Adversary Emulation Emulating the Sabotage-Focused Russian Adversary Sandworm-Part 1 ByFrancis Guibernau March 6, 2024July 31, 2025
Adversary Emulation | China Response to CISA Advisory (AA24-038A): PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure ByAttackIQ Team February 9, 2024July 21, 2025
Adversary Emulation | China Response to CISA Advisory (AA23-144A): China State-Sponsored Actor Volt Typhoon Living off the Land to Evade Detection ByAttackIQ Team May 25, 2023July 21, 2025
Adversary Emulation | North Korea Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1 ByAttackIQ Team January 5, 2023July 21, 2025
Adversary Emulation | Breach and Attack Simulation | Russia Emulating the Sophisticated Russian Adversary APT28 ByAttackIQ Team September 21, 2022July 22, 2025